YouTube Icon

Interview Questions.

Ibm I2 Analyst Placement Papers - Ibm I2 Analyst Interview Questions and Answers - Jul 28, 2022

fluid

Ibm I2 Analyst Placement Papers - Ibm I2 Analyst Interview Questions and Answers

Q1. Is It Possible For An Administrator To Control When Permits Are Required?

Yes. When a product is installed with product get admission to management configured, a allow is continually required, and the administrator controls get entry to to allows. 

Q2. What Is The Upgrade Path For Customers That Use Software License Management (slm)?

The vintage software license management and new product get right of entry to management are not compatible with each other. To take benefit of product get entry to management, customers have to uninstall any current licensing mechanism before installation. Any SLM lets in end up redundant and product access control allows have to be asked.

Q3. Can I Manage Permits Myself?

No. IBM affords a permit document this is established in step with your wishes as defined within the request form. You aren't able to configure the permit file after it's miles delivered. If the structure changes over the years, come again to IBM and request a replacement permit record. 

Q4. Is Product Access Management A Proprietary Ibm Solution?

No, product access management is based on third-birthday party technology from SafeNet inc. 

Q5. Is It Possible To Run More Than 1 Sentinel Rms License Server Per Machine?

No, you could only run 1 Sentinel RMS license server consistent with system. You should be capable of use permits from multiple software program vendors at the same server (the simplest thing to be watch out for is the model of the server software program). 

Q6. Can The Permits Be Maintained On Different Servers?

Yes. You can keep lets in on more than one servers. A fundamental scenario might be to apply  servers on your community to make certain that some lets in are continually to be had. You might have 1/2 of the total range of allows on each server. Under default operation, the patron broadcasts a request to all servers on the network, and uses the primary one to respond. It is feasible to configure the consumer to visit a particular server, and also to configure a seek order. In this example, configure 1/2 your clients to connect to server 1 first, and half of to connect with server 2 first. This configuration balances your usage over the 2 servers and additionally offers a stage of backup in the occasion of server failure. 

Q7. How Can Personal Computers On The Network Receive Permits?

Depending on deployment, the subsequent follow: 

Normal linked-to-the-server use : The entitled variety of allows are saved on a server at the customer premises. When a user starts offevolved a product with get right of entry to management enabled, a permit is asked from the server. Based on availability, either a allow is provided or the request is rejected (due to the fact a allow isn't available). When the consumer closes the product, the permit is again to the server. 

Borrowing from a server : While there is a network connection from the client pc to the server, it's also viable to borrow a permit. Permits may be borrowed for not less than a day and for any period up to 5 years. While borrowed, the allow is saved on the neighborhood pc, and is best to be had for use on that pc. 

The neighborhood permit is used rather than attempting to gain a allow from the server. This me that the pc can disconnect from the community and nevertheless use the included product. While the allow is borrowed, it isn't available for use from the pool of allows on the server. This borrowed allow is usable till the day be counted reaches zero. When the day count number reaches zero, the allow isn't always usable at the computer that borrowed it. The allow is made available at the server again. 

Borrowing remotely : If there's no network connection, it's far viable to apply equipment on the product distribution media to borrow a allow remotely. When borrowed, the revel in is the same as for borrowing from a community. Note that for this process to work, there ought to be a technique for changing text files (for example, by using e-mail or USB stick). 

Q8. We Have Hundreds Of Desktops That Require Product Access Management Capabilities. Can 'push' Tools Be Used (for Example, Sms)?

Like the rest of our products that use Microsoft Installer, silent installs throughout a network are viable. The parameters that are used are defined in the IBM i2 Product Access Management Administration Guide. 

Q9. What Happens To A Permit If The Computer That Contains That Permit Is Stolen? Is It Possible To Retrieve The Permit?

There is no unique manner to "pull" a permit lower back to the server. Where 'connected-to-the-server' use applies, the allow is returned as soon as the software is closed. In the 'borrowing' situation, the advice is to enforce practical borrowing instances.

For example:if the person is working remotely for 10 days, then set the borrowing time for 10 days. If the pc is stolen after seven days, on the tenth day the allow could be robotically back. Alternatively, you may request a alternative permit file from IBM, which would then supersede your authentic permit report. 

Q10. Is It Possible To Hand Over Permits On A Usb Flash Drive?

Yes. Remote borrowing is feasible, and borrowed licenses can be trferred on a USB flash force. 

Q11. Is It Possible To Report On Concurrent Usage?

Each traction that is done by means of the server is logged inside the following layout:

0 1 MTY1NQ== Fri Mar 12 14:42:fifty five 2010 1268404975 ANB.Foremost v8 0 1 zero Administrator TestBed_Shwcase 8.Three.Zero.900 1 - - - - - - 0 - - - MA== 655259 MTI2OTA2MDIzNA==This log record can be exported as a CSV document. By looking at the highlighted entry, you may see what number of permits are in use at that moment. See the IBM i2 Product Access Management Administration Guide for extra records. 

Q12. What Might Prevent My Client Broadcast From Finding The Sentinel Rms License Server?

The Sentinel RMS license server must exist inside the same subnet as the client broadcasting.

Q13. How Can I Deploy Permits To Computers That Are Not Connected To The Network, And Is It Possible To Limit Time Of Usage?

The approximate technique for borrowing remotely is as follows:

On the remote laptop:

Run a command-line device (furnished on the distribution media) 

Send the ensuing text report to an administrator that has access to the server.

On the community that is linked to the allow server:

The administrator runs every other device. This tool makes use of the document this is generated by using the remote pc to borrow the desired allows for the range of days required.

The administrator sends the ensuing text report to the consumer of the far off computer.

On the far off computer:

Run any other command-line tool to apply the lets in.

Q14. Can Ibm I2 Intelligence Analysis Portfolio Products At Version 8.9 Be Installed Alongside Older Versions Of Those Products?

No. 8.9 products aren't like minded with earlier variations. 

Q15. What Operating Systems Are Supported By The Sentinel Rms License Server That Enables Product Access Management Capabilities?

Sentinel RMS license server includes aid for the subsequent running structures:

32-bit versions of Windows Server 2000, 2003, and 2008

sixty four-bit versions of Windows Server 2003, 2008, and 2008 R@

Q16. Is It Possible To Limit The Number Of Permits Available For Checkout?

Yes. Through some implementation setup, lets in may be limited. In your design,

pick out at the least  servers:

The first server holds most of the permits with a view to be allotted/to be had.

The second server holds a small set of permits that aren't allocated and not advertised.

If a consumer wants get entry to to a product, and there aren't any lets in to be had from the first server, offer access to the second server and use those lets in.

Q17. Are The Product Access Management Capabilities Deployable And Supported In Virtual Environments?

The virtual environments that are supported for each of the products that use get right of entry to management are indexed within the relevant gadget necessities files. 

Q18. Is It Possible To Place A Time Limit On The Allocation Of A Permit?

It relies upon on the deployment: 

Normal related-to-the-server use : When a person begins the product, the computer requests a permit from the server. While the permit is allotted, that permit cannot be utilized by each person else till it is back to the pool. When the consumer closes the product, the allow is made available to be used on every other computer again. 

Borrowing from a server & Borrowing remotely: In the 'borrowing' state of affairs, a allow is allocated to the laptop for a term, ranging from one day as much as 5 years. The recommendation is continually to set a practical 'borrowing' period. For instance, if the person is working remotely for seven days, set the length for seven days. 

Q19. What Is The Smallest Time Period That A Permit Can Be Allocated For?

Permits can be borrowed for no less than someday. 

Q20. When Permit Files Are Requested, What Information About My Network Is Accessible By Ibm?

The lock codes which might be used to identify every server are generated the use of the server's MAC cope with and disk ID. The records is encrypted with an SHA-256 algorithm. It is not possible to work again to the original statistics that generated the code.




CFG